Commit | Line | Data |
---|---|---|
ba180fd4 JD |
1 | /* |
2 | * Copyright (C) 2000 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com) | |
1da177e4 LT |
3 | * Licensed under the GPL |
4 | */ | |
5 | ||
1da177e4 | 6 | #include "linux/audit.h" |
ba180fd4 JD |
7 | #include "linux/ptrace.h" |
8 | #include "linux/sched.h" | |
9 | #include "asm/uaccess.h" | |
1da177e4 | 10 | #include "skas_ptrace.h" |
1da177e4 | 11 | |
1bd09508 CH |
12 | |
13 | ||
14 | void user_enable_single_step(struct task_struct *child) | |
15 | { | |
16 | child->ptrace |= PT_DTRACE; | |
17 | child->thread.singlestep_syscall = 0; | |
18 | ||
19 | #ifdef SUBARCH_SET_SINGLESTEPPING | |
20 | SUBARCH_SET_SINGLESTEPPING(child, 1); | |
21 | #endif | |
22 | } | |
23 | ||
24 | void user_disable_single_step(struct task_struct *child) | |
82c1c11b | 25 | { |
1bd09508 | 26 | child->ptrace &= ~PT_DTRACE; |
ba180fd4 | 27 | child->thread.singlestep_syscall = 0; |
82c1c11b BS |
28 | |
29 | #ifdef SUBARCH_SET_SINGLESTEPPING | |
1bd09508 | 30 | SUBARCH_SET_SINGLESTEPPING(child, 0); |
82c1c11b | 31 | #endif |
ba9950c8 | 32 | } |
82c1c11b | 33 | |
1da177e4 LT |
34 | /* |
35 | * Called by kernel/ptrace.c when detaching.. | |
36 | */ | |
37 | void ptrace_disable(struct task_struct *child) | |
ba180fd4 | 38 | { |
1bd09508 | 39 | user_disable_single_step(child); |
1da177e4 LT |
40 | } |
41 | ||
82c1c11b BS |
42 | extern int peek_user(struct task_struct * child, long addr, long data); |
43 | extern int poke_user(struct task_struct * child, long addr, long data); | |
44 | ||
9b05a69e NK |
45 | long arch_ptrace(struct task_struct *child, long request, |
46 | unsigned long addr, unsigned long data) | |
1da177e4 | 47 | { |
1da177e4 | 48 | int i, ret; |
9b05a69e | 49 | unsigned long __user *p = (void __user *)data; |
0a3d763f | 50 | void __user *vp = p; |
1da177e4 | 51 | |
1da177e4 | 52 | switch (request) { |
1da177e4 | 53 | /* read the word at location addr in the USER area. */ |
ba180fd4 JD |
54 | case PTRACE_PEEKUSR: |
55 | ret = peek_user(child, addr, data); | |
56 | break; | |
1da177e4 | 57 | |
ba180fd4 JD |
58 | /* write the word at location addr in the USER area */ |
59 | case PTRACE_POKEUSR: | |
60 | ret = poke_user(child, addr, data); | |
61 | break; | |
1da177e4 | 62 | |
86d6f2bf RD |
63 | case PTRACE_SYSEMU: |
64 | case PTRACE_SYSEMU_SINGLESTEP: | |
65 | ret = -EIO; | |
66 | break; | |
67 | ||
1da177e4 LT |
68 | #ifdef PTRACE_GETREGS |
69 | case PTRACE_GETREGS: { /* Get all gp regs from the child. */ | |
4d338e1a | 70 | if (!access_ok(VERIFY_WRITE, p, MAX_REG_OFFSET)) { |
1da177e4 LT |
71 | ret = -EIO; |
72 | break; | |
73 | } | |
74 | for ( i = 0; i < MAX_REG_OFFSET; i += sizeof(long) ) { | |
4d338e1a AV |
75 | __put_user(getreg(child, i), p); |
76 | p++; | |
1da177e4 LT |
77 | } |
78 | ret = 0; | |
79 | break; | |
80 | } | |
81 | #endif | |
82 | #ifdef PTRACE_SETREGS | |
83 | case PTRACE_SETREGS: { /* Set all gp regs in the child. */ | |
84 | unsigned long tmp = 0; | |
4d338e1a | 85 | if (!access_ok(VERIFY_READ, p, MAX_REG_OFFSET)) { |
1da177e4 LT |
86 | ret = -EIO; |
87 | break; | |
88 | } | |
89 | for ( i = 0; i < MAX_REG_OFFSET; i += sizeof(long) ) { | |
4d338e1a | 90 | __get_user(tmp, p); |
1da177e4 | 91 | putreg(child, i, tmp); |
4d338e1a | 92 | p++; |
1da177e4 LT |
93 | } |
94 | ret = 0; | |
95 | break; | |
96 | } | |
1da177e4 | 97 | #endif |
aa6758d4 | 98 | case PTRACE_GET_THREAD_AREA: |
0a3d763f | 99 | ret = ptrace_get_thread_area(child, addr, vp); |
aa6758d4 PBG |
100 | break; |
101 | ||
102 | case PTRACE_SET_THREAD_AREA: | |
8818b671 | 103 | ret = ptrace_set_thread_area(child, addr, vp); |
aa6758d4 PBG |
104 | break; |
105 | ||
1da177e4 | 106 | case PTRACE_FAULTINFO: { |
ba180fd4 JD |
107 | /* |
108 | * Take the info from thread->arch->faultinfo, | |
4d338e1a AV |
109 | * but transfer max. sizeof(struct ptrace_faultinfo). |
110 | * On i386, ptrace_faultinfo is smaller! | |
111 | */ | |
112 | ret = copy_to_user(p, &child->thread.arch.faultinfo, | |
0a3d763f NK |
113 | sizeof(struct ptrace_faultinfo)) ? |
114 | -EIO : 0; | |
1da177e4 LT |
115 | break; |
116 | } | |
1da177e4 | 117 | |
c578455a | 118 | #ifdef PTRACE_LDT |
1da177e4 LT |
119 | case PTRACE_LDT: { |
120 | struct ptrace_ldt ldt; | |
121 | ||
ba180fd4 | 122 | if (copy_from_user(&ldt, p, sizeof(ldt))) { |
1da177e4 LT |
123 | ret = -EIO; |
124 | break; | |
125 | } | |
126 | ||
ba180fd4 JD |
127 | /* |
128 | * This one is confusing, so just punt and return -EIO for | |
1da177e4 LT |
129 | * now |
130 | */ | |
131 | ret = -EIO; | |
132 | break; | |
133 | } | |
1da177e4 LT |
134 | #endif |
135 | default: | |
136 | ret = ptrace_request(child, request, addr, data); | |
e8012b58 JD |
137 | if (ret == -EIO) |
138 | ret = subarch_ptrace(child, request, addr, data); | |
1da177e4 LT |
139 | break; |
140 | } | |
481bed45 | 141 | |
1da177e4 LT |
142 | return ret; |
143 | } | |
144 | ||
99764fa4 | 145 | static void send_sigtrap(struct task_struct *tsk, struct uml_pt_regs *regs, |
1da177e4 LT |
146 | int error_code) |
147 | { | |
148 | struct siginfo info; | |
149 | ||
150 | memset(&info, 0, sizeof(info)); | |
151 | info.si_signo = SIGTRAP; | |
152 | info.si_code = TRAP_BRKPT; | |
153 | ||
154 | /* User-mode eip? */ | |
155 | info.si_addr = UPT_IS_USER(regs) ? (void __user *) UPT_IP(regs) : NULL; | |
156 | ||
b60745b9 | 157 | /* Send us the fake SIGTRAP */ |
1da177e4 LT |
158 | force_sig_info(SIGTRAP, &info, tsk); |
159 | } | |
160 | ||
ba180fd4 JD |
161 | /* |
162 | * XXX Check PT_DTRACE vs TIF_SINGLESTEP for singlestepping check and | |
1da177e4 LT |
163 | * PT_PTRACED vs TIF_SYSCALL_TRACE for syscall tracing check |
164 | */ | |
77bf4400 | 165 | void syscall_trace(struct uml_pt_regs *regs, int entryexit) |
1da177e4 LT |
166 | { |
167 | int is_singlestep = (current->ptrace & PT_DTRACE) && entryexit; | |
168 | int tracesysgood; | |
169 | ||
b05d8447 EP |
170 | if (!entryexit) |
171 | audit_syscall_entry(HOST_AUDIT_ARCH, | |
172 | UPT_SYSCALL_NR(regs), | |
173 | UPT_SYSCALL_ARG1(regs), | |
174 | UPT_SYSCALL_ARG2(regs), | |
175 | UPT_SYSCALL_ARG3(regs), | |
176 | UPT_SYSCALL_ARG4(regs)); | |
177 | else | |
178 | audit_syscall_exit(regs); | |
1da177e4 LT |
179 | |
180 | /* Fake a debug trap */ | |
181 | if (is_singlestep) | |
182 | send_sigtrap(current, regs, 0); | |
183 | ||
184 | if (!test_thread_flag(TIF_SYSCALL_TRACE)) | |
185 | return; | |
186 | ||
187 | if (!(current->ptrace & PT_PTRACED)) | |
188 | return; | |
189 | ||
ba180fd4 JD |
190 | /* |
191 | * the 0x80 provides a way for the tracing parent to distinguish | |
192 | * between a syscall stop and SIGTRAP delivery | |
193 | */ | |
1da177e4 LT |
194 | tracesysgood = (current->ptrace & PT_TRACESYSGOOD); |
195 | ptrace_notify(SIGTRAP | (tracesysgood ? 0x80 : 0)); | |
196 | ||
197 | if (entryexit) /* force do_signal() --> is_syscall() */ | |
198 | set_thread_flag(TIF_SIGPENDING); | |
199 | ||
ba180fd4 JD |
200 | /* |
201 | * this isn't the same as continuing with a signal, but it will do | |
1da177e4 LT |
202 | * for normal use. strace only continues with a signal if the |
203 | * stopping signal is not SIGTRAP. -brl | |
204 | */ | |
205 | if (current->exit_code) { | |
206 | send_sig(current->exit_code, current, 1); | |
207 | current->exit_code = 0; | |
208 | } | |
209 | } |